Deck 14: Using Technology to Manage Information
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/44
Play
Full screen (f)
Deck 14: Using Technology to Manage Information
1
A(n) ____________ gives support to businesspeople during the decision-making process.
A) database
B) management information system
C) decision support system
D) expert system
A) database
B) management information system
C) decision support system
D) expert system
C
2
Which of the following is a software program that performs the specific tasks that the user wants to carry out?
A) consumer software
B) enterprise software
C) application software
D) presentation software
A) consumer software
B) enterprise software
C) application software
D) presentation software
D
3
The executive responsible for managing a firm's information systems and related computer technologies.
A) IVP
B) CIS
C) PIT
D) CIO
A) IVP
B) CIS
C) PIT
D) CIO
D
4
SpaceX and Airbnb are examples of companies referred to as _________________ which use innovative business models to bring about disruption in a particular industry.
A) the fourth industrial revolution
B) unicorns
C) tall poppies
D) information systems
A) the fourth industrial revolution
B) unicorns
C) tall poppies
D) information systems
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not one of the components of a computer-based information system?
A) computer hardware
B) telecommuting networks
C) computer software
D) data resource management
A) computer hardware
B) telecommuting networks
C) computer software
D) data resource management
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
6
A(n) _________ is a management support system that imitates human thinking through "if-then" rules.
A) decision support system
B) management information system
C) executive support system
D) expert system
A) decision support system
B) management information system
C) executive support system
D) expert system
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
7
_______________________are less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders.
A) mindfulness in the marketplace
B) mergers and acquisitions
C) disruptive innovations
D) workplace diversity
A) mindfulness in the marketplace
B) mergers and acquisitions
C) disruptive innovations
D) workplace diversity
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
8
The application software that would be best suited for creating a sales presentation is
A) word processing.
B) desktop publishing.
C) spreadsheets.
D) presentation software.
A) word processing.
B) desktop publishing.
C) spreadsheets.
D) presentation software.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
9
How is data different from information?
A) Data is current; information is unchanging.
B) Information is knowledge; data are the facts that can be converted to a usable form.
C) Data is continuously collected but information is only collected sporadically.
D) Information is more overwhelming than data.
A) Data is current; information is unchanging.
B) Information is knowledge; data are the facts that can be converted to a usable form.
C) Data is continuously collected but information is only collected sporadically.
D) Information is more overwhelming than data.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
10
All of the following are examples of application software except:
A) Microsoft Word.
B) Linux.
C) Google Chrome.
D) Quick Books.
A) Microsoft Word.
B) Linux.
C) Google Chrome.
D) Quick Books.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
11
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.
A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
12
A smart phone is a device that combines a cell phone with a PDA.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
13
Computer-based information systems consist of all of the following components except
A) hardware.
B) software.
C) telecommunications and networks.
D) transcontinental soundboards.
A) hardware.
B) software.
C) telecommunications and networks.
D) transcontinental soundboards.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
14
Technology is allowing firms to track business activities almost instantaneously. Package delivery companies such as FedEx and UPS use __________ to transmit information within seconds to the package sender.
A) netbooks
B) hand-held scanners
C) smart phones
D) PDAs
A) netbooks
B) hand-held scanners
C) smart phones
D) PDAs
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
15
All of the following are ways technology has forever changed today's business except:
A) semiconductors
B) Internet
C) Telecom
D) double-entry accounting
A) semiconductors
B) Internet
C) Telecom
D) double-entry accounting
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
16
An information system should ______________________________________.
A) make decisions for the company
B) prevent mistakes from occurring
C) collect, store, and communicate past, present, and projected information
D) provide competitive data and low cost
A) make decisions for the company
B) prevent mistakes from occurring
C) collect, store, and communicate past, present, and projected information
D) provide competitive data and low cost
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
17
Information that can be stored and retrieved for use is kept in a __________.
A) server
B) data system
C) information system
D) database
A) server
B) data system
C) information system
D) database
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) __________ can be tailored to assist many business functions and departments-from marketing and manufacturing to finance and accounting.
A) data information system
B) expert system
C) data processing system
D) information system
A) data information system
B) expert system
C) data processing system
D) information system
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
19
The fourth industrial revolution has been powered by _____________________________.
A) digitization in manufacturing
B) corporate social responsibility
C) disruptive innovations
D) the ecological movement
A) digitization in manufacturing
B) corporate social responsibility
C) disruptive innovations
D) the ecological movement
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
20
The heart of any information system is its ______________________________.
A) information system
B) database
C) DSS
D) ESS
A) information system
B) database
C) DSS
D) ESS
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
21
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called _____________________________________.
A) virtual private network
B) dial-up
C) Skype
D) VoIP
A) virtual private network
B) dial-up
C) Skype
D) VoIP
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
22
The current standard for wireless networks is called a _______________________________.
A) hotspot
B) local area network (LAN)
C) wide area network (WAN)
D) wireless fidelity (Wi-Fi)
A) hotspot
B) local area network (LAN)
C) wide area network (WAN)
D) wireless fidelity (Wi-Fi)
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
23
Natural disasters and power failures affect businesses and cost billions of dollars. To minimize the damage that these events cause, companies should perform
A) disaster recovery planning.
B) contingency planning.
C) backup planning.
D) information processing analysis.
A) disaster recovery planning.
B) contingency planning.
C) backup planning.
D) information processing analysis.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
24
__________ limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
A) Firewalls
B) Intranets
C) Output devices
D) Virtual Private Networks
A) Firewalls
B) Intranets
C) Output devices
D) Virtual Private Networks
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
25
Alec's company experiences fairly steady computing demand except for the weekend after Thanksgiving when traffic spikes. Since his company is relatively small, he doesn't want to invest in resources that will be used fairly seldom. Alec is considering
A) database management.
B) cloud computing.
C) grid computing.
D) on-demand computing.
A) database management.
B) cloud computing.
C) grid computing.
D) on-demand computing.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
26
The first step in off-site data storage is ________________________________.
A) planning which data needs to be protected
B) selecting the right security vendor
C) establishing a backup schedule
D) testing and evaluating the system
A) planning which data needs to be protected
B) selecting the right security vendor
C) establishing a backup schedule
D) testing and evaluating the system
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
27
One of the primary considerations in deciding what data to protectively store is the severe legal consequences if lost.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
28
Software that gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes, is referred to as (a) ______________________.
A) Trojan horse
B) cookie
C) spyware
D) botnet
A) Trojan horse
B) cookie
C) spyware
D) botnet
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
29
WANs are networks designed to connect a company's employees on multiple floors of an office high-rise.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
30
JetBlue reservation agents work in ___________, an example of a ___________.
A) virtual offices; information technology.
B) home-based offices; distributed workforce.
C) information gathering; virtual office.
D) virtual offices; on-demand computing.
A) virtual offices; information technology.
B) home-based offices; distributed workforce.
C) information gathering; virtual office.
D) virtual offices; on-demand computing.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
31
_________ can be an outcome of poorly protecting employee or customer data.
A) Viruses
B) Employee monitoring
C) Ethical concerns
D) Identity theft
A) Viruses
B) Employee monitoring
C) Ethical concerns
D) Identity theft
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
32
A Trojan horse ______________________________________________.
A) secretly attaches itself to another program and changes it
B) exploits a security hole in a network to replicate itself
C) is a program that claims to do one thing, but in reality does something else, usually malicious
D) secretly gathers user information through the user's Internet connection
A) secretly attaches itself to another program and changes it
B) exploits a security hole in a network to replicate itself
C) is a program that claims to do one thing, but in reality does something else, usually malicious
D) secretly gathers user information through the user's Internet connection
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
33
All of the following are examples of e-crimes except:
A) employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) when a customer calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
A) employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) when a customer calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
34
Traditionally, users have purchased software licenses and installed the programs directly on hardware and systems. A new trend, championed by Google, among others, uses powerful servers to store applications outside the individual company but accessible from anywhere via the Web. This new approach is called __________________________________.
A) database management
B) cloud computing
C) grid computing
D) on-demand computing
A) database management
B) cloud computing
C) grid computing
D) on-demand computing
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
35
A small piece of software that uses a security hole in a network to replicate itself is referred to as a ______________________________________.
A) Trojan horse
B) cookie
C) worm
D) virus
A) Trojan horse
B) cookie
C) worm
D) virus
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
36
A firm that has operations in many regions wants to link its computer systems for increased productivity. It should consider a
A) wide area network (WAN).
B) local area network (LAN).
C) hotspot network.
D) voice over Internet protocol (VoIP).
A) wide area network (WAN).
B) local area network (LAN).
C) hotspot network.
D) voice over Internet protocol (VoIP).
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
37
A computer network that is similar to the Internet but limits access to authorized users is referred to as which of the following?
A) firewalls
B) intranets
C) extranet
D) virtual private network
A) firewalls
B) intranets
C) extranet
D) virtual private network
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
38
MAC users are less vulnerable to cybercrimes because of storage of data in the cloud rather than on hard drives.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
39
Any malicious software program designed to infect computer systems is referred to as (a):
A) Trojan horse.
B) cookie.
C) malware.
D) virus.
A) Trojan horse.
B) cookie.
C) malware.
D) virus.
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
40
A computer network that connects machines within limited areas, such as a building or several nearby buildings, is called a ______________________________________.
A) wide area network (WAN)
B) local area network (LAN)
C) hotspot network
D) voice over Internet protocol (VoIP)
A) wide area network (WAN)
B) local area network (LAN)
C) hotspot network
D) voice over Internet protocol (VoIP)
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
41
A network of smaller computers that run special software is referred to as ???_____________.
A) cloud computing
B) grid computing
C) utility computing
D) super computing
A) cloud computing
B) grid computing
C) utility computing
D) super computing
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
42
An outside supplier that provides both the computers and the application support for managing an information system is referred to as (an) ____________________________.
A) cloud computing
B) offshore provider
C) application service provider
D) enterprise IT manager
A) cloud computing
B) offshore provider
C) application service provider
D) enterprise IT manager
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
43
Virtual offices are trend-driven and are becoming less used by businesses.
a) True
b) False
a) True
b) False
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck
44
Another term used for on-demand computing is ______________.
A) cloud computing
B) grid computing
C) utility computing
D) super computing
A) cloud computing
B) grid computing
C) utility computing
D) super computing
Unlock Deck
Unlock for access to all 44 flashcards in this deck.
Unlock Deck
k this deck